Solved

PPP Implementation on Linux

Posted on 2001-09-03
8
229 Views
Last Modified: 2010-05-18
Can anybody give me the design details of PPP implementation on LInux.
0
Comment
Question by:rameshnaik
8 Comments
 
LVL 17

Expert Comment

by:dorward
ID: 6450259
If you head over to http://www.kernel.org/ you can get yourself a copy of the source code. You should be able to find sourcecode for pppd (the ppp demon) at http://freshmeat.net/
0
 

Author Comment

by:rameshnaik
ID: 6450322
I was looking for a document sort of a thing that will
explain how PPP is implemented in the Linux. Do i get the document also at these sites? Understanding document is far more easier than going through the source code. Right! Thanks for the immediate response.
0
 
LVL 17

Expert Comment

by:dorward
ID: 6450477
I haven't looked. Hopefully the code with be well commented.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 2

Accepted Solution

by:
ifincham earned 100 total points
ID: 6450879
Hi,

The obvious first place to look is the PPP howto at --> http://www.linuxdoc.org/HOWTO/PPP-HOWTO/ . See also --> http://www.linuxdoc.org/LDP/nag/node107.html and --> http://freshmeat.net/projects/pppd/ .

Hope these help
0
 

Author Comment

by:rameshnaik
ID: 6452123
Thank You very much. It was indeed a great help.
0
 

Expert Comment

by:CleanupPing
ID: 9078688
rameshnaik:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 7

Expert Comment

by:troopern
ID: 9993692
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Accept ifincham's comment as answer.
Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

troopern
EE Cleanup Volunteer
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now